SUSE SLES15 Security Update : kernel (SUSE-SU-2024:2929-1)

high Nessus Plugin ID 205650

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES15 / SLES_SAP15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2024:2929-1 advisory.

The SUSE Linux Enterprise 15 SP4 kernel was updated to receive various security bugfixes.


The following security bugs were fixed:

- CVE-2024-39494: ima: Fix use-after-free on a dentry's dname.name (bsc#1227716).
- CVE-2024-41069: ASoC: topology: Fix route memory corruption (bsc#1228644).
- CVE-2024-40954: net: do not leave a dangling sk pointer, when socket creation fails (bsc#1227808)
- CVE-2024-42145: IB/core: Implement a limit on UMAD receive List (bsc#1228743)
- CVE-2024-40994: ptp: fix integer overflow in max_vclocks_store (bsc#1227829).
- CVE-2024-41012: filelock: Remove locks reliably when fcntl/close race is detected (bsc#1228247).
- CVE-2024-42093: net/dpaa2: Avoid explicit cpumask var allocation on stack (bsc#1228680).
- CVE-2024-40989: KVM: arm64: Disassociate vcpus from redistributor region on teardown (bsc#1227823).
- CVE-2024-41059: hfsplus: fix uninit-value in copy_name (bsc#1228561).
- CVE-2024-40956: dmaengine: idxd: Fix possible Use-After-Free in irq_process_work_list (bsc#1227810).
- CVE-2024-41090: tap: add missing verification for short frame (bsc#1228328).
- CVE-2024-41011: drm/amdkfd: do not allow mapping the MMIO HDP page with large pages (bsc#1228114).
- CVE-2024-39463: 9p: add missing locking around taking dentry fid list (bsc#1227090).
- CVE-2021-47598: sch_cake: do not call cake_destroy() from cake_init() (bsc#1226574).
- CVE-2024-40937: gve: Clear napi->skb before dev_kfree_skb_any() (bsc#1227836).
- CVE-2024-35901: net: mana: Fix Rx DMA datasize and skb_over_panic (bsc#1224495).
- CVE-2024-42230: powerpc/pseries: Fix scv instruction crash with kexec (bsc#1194869).
- CVE-2024-26585: Fixed race between tx work scheduling and socket close (bsc#1220187).
- CVE-2024-36974: net/sched: taprio: always validate TCA_TAPRIO_ATTR_PRIOMAP (bsc#1226519).
- CVE-2024-38555: net/mlx5: Discard command completions in internal error (bsc#1226607).

The following non-security bugs were fixed:

- NFS: Do not re-read the entire page cache to find the next cookie (bsc#1226662).
- NFS: Reduce use of uncached readdir (bsc#1226662).
- NFSv4.x: by default serialize open/close operations (bsc#1226226 bsc#1223863).
- X.509: Fix the parser of extended key usage for length (bsc#1218820).
- btrfs: sysfs: update fs features directory asynchronously (bsc#1226168).
- cgroup/cpuset: Prevent UAF in proc_cpuset_show() (bsc#1228801).
- jfs: xattr: fix buffer overflow for invalid xattr (bsc#1227383).
- kABI: rtas: Workaround false positive due to lost definition (bsc#1227487).
- kernel-binary: vdso: Own module_dir
- net/dcb: check for detached device before executing callbacks (bsc#1215587).
- ocfs2: fix DIO failure due to insufficient transaction credits (bsc#1216834).
- powerpc/rtas: Prevent Spectre v1 gadget construction in sys_rtas() (bsc#1227487).
- powerpc/rtas: clean up includes (bsc#1227487).
- workqueue: Improve scalability of workqueue watchdog touch (bsc#1193454).
- workqueue: wq_watchdog_touch is always called with valid CPU (bsc#1193454).

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.suse.com/1156395

https://bugzilla.suse.com/1190336

https://bugzilla.suse.com/1191958

https://bugzilla.suse.com/1193454

https://bugzilla.suse.com/1193554

https://bugzilla.suse.com/1193787

https://bugzilla.suse.com/1193883

https://bugzilla.suse.com/1194324

https://bugzilla.suse.com/1194826

https://bugzilla.suse.com/1194869

https://bugzilla.suse.com/1195065

https://bugzilla.suse.com/1195254

https://bugzilla.suse.com/1195341

https://bugzilla.suse.com/1195349

https://bugzilla.suse.com/1195357

https://bugzilla.suse.com/1195668

https://bugzilla.suse.com/1195927

https://bugzilla.suse.com/1195957

https://bugzilla.suse.com/1196018

https://bugzilla.suse.com/1196746

https://bugzilla.suse.com/1196823

https://bugzilla.suse.com/1197146

https://bugzilla.suse.com/1197246

https://bugzilla.suse.com/1197762

https://bugzilla.suse.com/1197915

https://bugzilla.suse.com/1198014

https://bugzilla.suse.com/1199295

https://bugzilla.suse.com/1202346

https://bugzilla.suse.com/1202686

https://bugzilla.suse.com/1202767

https://bugzilla.suse.com/1202780

https://bugzilla.suse.com/1209636

https://bugzilla.suse.com/1213123

https://bugzilla.suse.com/1215587

https://bugzilla.suse.com/1216834

https://bugzilla.suse.com/1218820

https://bugzilla.suse.com/1220185

https://bugzilla.suse.com/1220186

https://bugzilla.suse.com/1220187

https://bugzilla.suse.com/1221044

https://bugzilla.suse.com/1222011

https://bugzilla.suse.com/1222728

https://bugzilla.suse.com/1222809

https://bugzilla.suse.com/1222810

https://bugzilla.suse.com/1223635

https://bugzilla.suse.com/1223863

https://bugzilla.suse.com/1224488

https://bugzilla.suse.com/1224495

https://bugzilla.suse.com/1224671

https://bugzilla.suse.com/1225573

https://bugzilla.suse.com/1225829

https://bugzilla.suse.com/1226168

https://bugzilla.suse.com/1226226

https://bugzilla.suse.com/1226519

https://bugzilla.suse.com/1226537

https://bugzilla.suse.com/1226539

https://bugzilla.suse.com/1226550

https://bugzilla.suse.com/1226553

https://bugzilla.suse.com/1226554

https://bugzilla.suse.com/1226556

https://bugzilla.suse.com/1226557

https://bugzilla.suse.com/1226558

https://bugzilla.suse.com/1226559

https://bugzilla.suse.com/1226561

https://bugzilla.suse.com/1226562

https://bugzilla.suse.com/1226563

https://bugzilla.suse.com/1226564

https://bugzilla.suse.com/1226567

https://bugzilla.suse.com/1226569

https://bugzilla.suse.com/1226572

https://bugzilla.suse.com/1226574

https://bugzilla.suse.com/1226575

https://bugzilla.suse.com/1226576

https://bugzilla.suse.com/1226577

https://bugzilla.suse.com/1226580

https://bugzilla.suse.com/1226583

https://bugzilla.suse.com/1226585

https://bugzilla.suse.com/1226587

https://bugzilla.suse.com/1226601

https://bugzilla.suse.com/1226602

https://bugzilla.suse.com/1226603

https://bugzilla.suse.com/1226607

https://bugzilla.suse.com/1226614

https://bugzilla.suse.com/1226617

https://bugzilla.suse.com/1226618

https://bugzilla.suse.com/1226619

https://bugzilla.suse.com/1226621

https://bugzilla.suse.com/1226624

https://bugzilla.suse.com/1226626

https://bugzilla.suse.com/1226628

https://bugzilla.suse.com/1226629

https://bugzilla.suse.com/1226643

https://bugzilla.suse.com/1226644

https://bugzilla.suse.com/1226645

https://bugzilla.suse.com/1226650

https://bugzilla.suse.com/1226653

https://bugzilla.suse.com/1226662

https://bugzilla.suse.com/1226669

https://bugzilla.suse.com/1226670

https://bugzilla.suse.com/1226672

https://bugzilla.suse.com/1226673

https://bugzilla.suse.com/1226674

https://bugzilla.suse.com/1226675

https://bugzilla.suse.com/1226679

https://bugzilla.suse.com/1226683

https://bugzilla.suse.com/1226685

https://bugzilla.suse.com/1226686

https://bugzilla.suse.com/1226690

https://bugzilla.suse.com/1226691

https://bugzilla.suse.com/1226692

https://bugzilla.suse.com/1226696

https://bugzilla.suse.com/1226697

https://bugzilla.suse.com/1226698

https://bugzilla.suse.com/1226699

https://bugzilla.suse.com/1226701

https://bugzilla.suse.com/1226702

https://bugzilla.suse.com/1226703

https://bugzilla.suse.com/1226705

https://bugzilla.suse.com/1226708

https://bugzilla.suse.com/1226709

https://bugzilla.suse.com/1226710

https://bugzilla.suse.com/1226711

https://bugzilla.suse.com/1226712

https://bugzilla.suse.com/1226713

https://bugzilla.suse.com/1226715

https://bugzilla.suse.com/1226716

https://bugzilla.suse.com/1226719

https://bugzilla.suse.com/1226720

https://bugzilla.suse.com/1226721

https://bugzilla.suse.com/1226732

https://bugzilla.suse.com/1226758

https://bugzilla.suse.com/1226762

https://bugzilla.suse.com/1226785

https://bugzilla.suse.com/1227090

https://bugzilla.suse.com/1227383

https://bugzilla.suse.com/1227487

https://bugzilla.suse.com/1227549

https://bugzilla.suse.com/1227716

https://bugzilla.suse.com/1227750

https://bugzilla.suse.com/1227764

https://bugzilla.suse.com/1227808

https://bugzilla.suse.com/1227810

https://bugzilla.suse.com/1227823

https://bugzilla.suse.com/1227829

https://bugzilla.suse.com/1227836

https://bugzilla.suse.com/1227917

https://bugzilla.suse.com/1227920

https://bugzilla.suse.com/1227921

https://bugzilla.suse.com/1227922

https://bugzilla.suse.com/1227923

https://bugzilla.suse.com/1227924

https://bugzilla.suse.com/1227925

https://bugzilla.suse.com/1227928

https://bugzilla.suse.com/1227931

https://bugzilla.suse.com/1227932

https://bugzilla.suse.com/1227933

https://bugzilla.suse.com/1227935

https://bugzilla.suse.com/1227938

https://bugzilla.suse.com/1227941

https://bugzilla.suse.com/1227942

https://bugzilla.suse.com/1227944

https://bugzilla.suse.com/1227945

https://bugzilla.suse.com/1227948

https://bugzilla.suse.com/1227949

https://bugzilla.suse.com/1227952

https://bugzilla.suse.com/1227953

https://bugzilla.suse.com/1227954

https://bugzilla.suse.com/1227956

https://bugzilla.suse.com/1227963

https://bugzilla.suse.com/1227964

https://bugzilla.suse.com/1227965

https://bugzilla.suse.com/1227968

https://bugzilla.suse.com/1227969

https://bugzilla.suse.com/1227970

https://bugzilla.suse.com/1227971

https://bugzilla.suse.com/1227972

https://bugzilla.suse.com/1227975

https://bugzilla.suse.com/1227976

https://bugzilla.suse.com/1227981

https://bugzilla.suse.com/1227982

https://bugzilla.suse.com/1227985

https://bugzilla.suse.com/1227986

https://bugzilla.suse.com/1227987

https://bugzilla.suse.com/1227988

https://bugzilla.suse.com/1227989

https://bugzilla.suse.com/1227990

https://bugzilla.suse.com/1227991

https://bugzilla.suse.com/1227993

https://bugzilla.suse.com/1227995

https://bugzilla.suse.com/1227996

https://bugzilla.suse.com/1227997

https://bugzilla.suse.com/1228000

https://bugzilla.suse.com/1228002

https://bugzilla.suse.com/1228004

https://bugzilla.suse.com/1228005

https://bugzilla.suse.com/1228006

https://bugzilla.suse.com/1228007

https://bugzilla.suse.com/1228008

https://bugzilla.suse.com/1228009

https://bugzilla.suse.com/1228010

https://bugzilla.suse.com/1228013

https://bugzilla.suse.com/1228014

https://bugzilla.suse.com/1228015

https://bugzilla.suse.com/1228019

https://bugzilla.suse.com/1228025

https://bugzilla.suse.com/1228028

https://bugzilla.suse.com/1228035

https://bugzilla.suse.com/1228037

https://bugzilla.suse.com/1228038

https://bugzilla.suse.com/1228039

https://bugzilla.suse.com/1228040

https://bugzilla.suse.com/1228045

https://bugzilla.suse.com/1228054

https://bugzilla.suse.com/1228055

https://bugzilla.suse.com/1228056

https://bugzilla.suse.com/1228060

https://bugzilla.suse.com/1228061

https://bugzilla.suse.com/1228062

https://bugzilla.suse.com/1228063

https://bugzilla.suse.com/1228064

https://bugzilla.suse.com/1228066

https://bugzilla.suse.com/1228114

https://bugzilla.suse.com/1228247

https://bugzilla.suse.com/1228328

https://bugzilla.suse.com/1228440

https://bugzilla.suse.com/1228561

https://bugzilla.suse.com/1228644

https://bugzilla.suse.com/1228680

https://bugzilla.suse.com/1228743

https://bugzilla.suse.com/1228801

https://lists.suse.com/pipermail/sle-updates/2024-August/036473.html

https://www.suse.com/security/cve/CVE-2021-4439

https://www.suse.com/security/cve/CVE-2021-47534

https://www.suse.com/security/cve/CVE-2021-47576

https://www.suse.com/security/cve/CVE-2021-47578

https://www.suse.com/security/cve/CVE-2021-47580

https://www.suse.com/security/cve/CVE-2021-47582

https://www.suse.com/security/cve/CVE-2021-47583

https://www.suse.com/security/cve/CVE-2021-47584

https://www.suse.com/security/cve/CVE-2021-47585

https://www.suse.com/security/cve/CVE-2021-47586

https://www.suse.com/security/cve/CVE-2021-47587

https://www.suse.com/security/cve/CVE-2021-47589

https://www.suse.com/security/cve/CVE-2021-47592

https://www.suse.com/security/cve/CVE-2021-47596

https://www.suse.com/security/cve/CVE-2021-47597

https://www.suse.com/security/cve/CVE-2021-47598

https://www.suse.com/security/cve/CVE-2021-47600

https://www.suse.com/security/cve/CVE-2021-47601

https://www.suse.com/security/cve/CVE-2021-47602

https://www.suse.com/security/cve/CVE-2021-47603

https://www.suse.com/security/cve/CVE-2021-47607

https://www.suse.com/security/cve/CVE-2021-47608

https://www.suse.com/security/cve/CVE-2021-47609

https://www.suse.com/security/cve/CVE-2021-47611

https://www.suse.com/security/cve/CVE-2021-47612

https://www.suse.com/security/cve/CVE-2021-47614

https://www.suse.com/security/cve/CVE-2021-47615

https://www.suse.com/security/cve/CVE-2021-47616

https://www.suse.com/security/cve/CVE-2021-47617

https://www.suse.com/security/cve/CVE-2021-47618

https://www.suse.com/security/cve/CVE-2021-47619

https://www.suse.com/security/cve/CVE-2021-47620

https://www.suse.com/security/cve/CVE-2021-47622

https://www.suse.com/security/cve/CVE-2021-47624

https://www.suse.com/security/cve/CVE-2022-0854

https://www.suse.com/security/cve/CVE-2022-20368

https://www.suse.com/security/cve/CVE-2022-28748

https://www.suse.com/security/cve/CVE-2022-2964

https://www.suse.com/security/cve/CVE-2022-48711

https://www.suse.com/security/cve/CVE-2022-48712

https://www.suse.com/security/cve/CVE-2022-48713

https://www.suse.com/security/cve/CVE-2022-48715

https://www.suse.com/security/cve/CVE-2022-48717

https://www.suse.com/security/cve/CVE-2022-48720

https://www.suse.com/security/cve/CVE-2022-48721

https://www.suse.com/security/cve/CVE-2022-48722

https://www.suse.com/security/cve/CVE-2022-48723

https://www.suse.com/security/cve/CVE-2022-48724

https://www.suse.com/security/cve/CVE-2022-48725

https://www.suse.com/security/cve/CVE-2022-48726

https://www.suse.com/security/cve/CVE-2022-48727

https://www.suse.com/security/cve/CVE-2022-48728

https://www.suse.com/security/cve/CVE-2022-48729

https://www.suse.com/security/cve/CVE-2022-48730

https://www.suse.com/security/cve/CVE-2022-48732

https://www.suse.com/security/cve/CVE-2022-48734

https://www.suse.com/security/cve/CVE-2022-48735

https://www.suse.com/security/cve/CVE-2022-48736

https://www.suse.com/security/cve/CVE-2022-48737

https://www.suse.com/security/cve/CVE-2022-48738

https://www.suse.com/security/cve/CVE-2022-48739

https://www.suse.com/security/cve/CVE-2022-48740

https://www.suse.com/security/cve/CVE-2022-48743

https://www.suse.com/security/cve/CVE-2022-48744

https://www.suse.com/security/cve/CVE-2022-48745

https://www.suse.com/security/cve/CVE-2022-48746

https://www.suse.com/security/cve/CVE-2022-48747

https://www.suse.com/security/cve/CVE-2022-48749

https://www.suse.com/security/cve/CVE-2022-48751

https://www.suse.com/security/cve/CVE-2022-48752

https://www.suse.com/security/cve/CVE-2022-48754

https://www.suse.com/security/cve/CVE-2022-48756

https://www.suse.com/security/cve/CVE-2022-48758

https://www.suse.com/security/cve/CVE-2022-48759

https://www.suse.com/security/cve/CVE-2022-48760

https://www.suse.com/security/cve/CVE-2022-48761

https://www.suse.com/security/cve/CVE-2022-48763

https://www.suse.com/security/cve/CVE-2022-48765

https://www.suse.com/security/cve/CVE-2022-48767

https://www.suse.com/security/cve/CVE-2022-48768

https://www.suse.com/security/cve/CVE-2022-48769

https://www.suse.com/security/cve/CVE-2022-48771

https://www.suse.com/security/cve/CVE-2022-48773

https://www.suse.com/security/cve/CVE-2022-48774

https://www.suse.com/security/cve/CVE-2022-48775

https://www.suse.com/security/cve/CVE-2022-48776

https://www.suse.com/security/cve/CVE-2022-48777

https://www.suse.com/security/cve/CVE-2022-48778

https://www.suse.com/security/cve/CVE-2022-48780

https://www.suse.com/security/cve/CVE-2022-48783

https://www.suse.com/security/cve/CVE-2022-48784

https://www.suse.com/security/cve/CVE-2022-48786

https://www.suse.com/security/cve/CVE-2022-48787

https://www.suse.com/security/cve/CVE-2022-48788

https://www.suse.com/security/cve/CVE-2022-48789

https://www.suse.com/security/cve/CVE-2022-48790

https://www.suse.com/security/cve/CVE-2022-48791

https://www.suse.com/security/cve/CVE-2022-48792

https://www.suse.com/security/cve/CVE-2022-48793

https://www.suse.com/security/cve/CVE-2022-48794

https://www.suse.com/security/cve/CVE-2022-48796

https://www.suse.com/security/cve/CVE-2022-48797

https://www.suse.com/security/cve/CVE-2022-48798

https://www.suse.com/security/cve/CVE-2022-48799

https://www.suse.com/security/cve/CVE-2022-48800

https://www.suse.com/security/cve/CVE-2022-48801

https://www.suse.com/security/cve/CVE-2022-48802

https://www.suse.com/security/cve/CVE-2022-48803

https://www.suse.com/security/cve/CVE-2022-48804

https://www.suse.com/security/cve/CVE-2022-48805

https://www.suse.com/security/cve/CVE-2022-48806

https://www.suse.com/security/cve/CVE-2022-48807

https://www.suse.com/security/cve/CVE-2022-48811

https://www.suse.com/security/cve/CVE-2022-48812

https://www.suse.com/security/cve/CVE-2022-48813

https://www.suse.com/security/cve/CVE-2022-48814

https://www.suse.com/security/cve/CVE-2022-48815

https://www.suse.com/security/cve/CVE-2022-48816

https://www.suse.com/security/cve/CVE-2022-48817

https://www.suse.com/security/cve/CVE-2022-48818

https://www.suse.com/security/cve/CVE-2022-48820

https://www.suse.com/security/cve/CVE-2022-48821

https://www.suse.com/security/cve/CVE-2022-48822

https://www.suse.com/security/cve/CVE-2022-48823

https://www.suse.com/security/cve/CVE-2022-48824

https://www.suse.com/security/cve/CVE-2022-48825

https://www.suse.com/security/cve/CVE-2022-48826

https://www.suse.com/security/cve/CVE-2022-48827

https://www.suse.com/security/cve/CVE-2022-48828

https://www.suse.com/security/cve/CVE-2022-48829

https://www.suse.com/security/cve/CVE-2022-48830

https://www.suse.com/security/cve/CVE-2022-48831

https://www.suse.com/security/cve/CVE-2022-48834

https://www.suse.com/security/cve/CVE-2022-48835

https://www.suse.com/security/cve/CVE-2022-48836

https://www.suse.com/security/cve/CVE-2022-48837

https://www.suse.com/security/cve/CVE-2022-48838

https://www.suse.com/security/cve/CVE-2022-48839

https://www.suse.com/security/cve/CVE-2022-48840

https://www.suse.com/security/cve/CVE-2022-48841

https://www.suse.com/security/cve/CVE-2022-48842

https://www.suse.com/security/cve/CVE-2022-48843

https://www.suse.com/security/cve/CVE-2022-48847

https://www.suse.com/security/cve/CVE-2022-48849

https://www.suse.com/security/cve/CVE-2022-48851

https://www.suse.com/security/cve/CVE-2022-48853

https://www.suse.com/security/cve/CVE-2022-48856

https://www.suse.com/security/cve/CVE-2022-48857

https://www.suse.com/security/cve/CVE-2022-48858

https://www.suse.com/security/cve/CVE-2022-48859

https://www.suse.com/security/cve/CVE-2022-48860

https://www.suse.com/security/cve/CVE-2022-48861

https://www.suse.com/security/cve/CVE-2022-48862

https://www.suse.com/security/cve/CVE-2022-48863

https://www.suse.com/security/cve/CVE-2022-48866

https://www.suse.com/security/cve/CVE-2023-1582

https://www.suse.com/security/cve/CVE-2023-37453

https://www.suse.com/security/cve/CVE-2023-52591

https://www.suse.com/security/cve/CVE-2023-52762

https://www.suse.com/security/cve/CVE-2023-52766

https://www.suse.com/security/cve/CVE-2023-52800

https://www.suse.com/security/cve/CVE-2023-52885

https://www.suse.com/security/cve/CVE-2023-52886

https://www.suse.com/security/cve/CVE-2024-26583

https://www.suse.com/security/cve/CVE-2024-26584

https://www.suse.com/security/cve/CVE-2024-26585

https://www.suse.com/security/cve/CVE-2024-26800

https://www.suse.com/security/cve/CVE-2024-26813

https://www.suse.com/security/cve/CVE-2024-26814

https://www.suse.com/security/cve/CVE-2024-26976

https://www.suse.com/security/cve/CVE-2024-35878

https://www.suse.com/security/cve/CVE-2024-35901

https://www.suse.com/security/cve/CVE-2024-35905

https://www.suse.com/security/cve/CVE-2024-36926

https://www.suse.com/security/cve/CVE-2024-36974

https://www.suse.com/security/cve/CVE-2024-38541

https://www.suse.com/security/cve/CVE-2024-38555

https://www.suse.com/security/cve/CVE-2024-38559

https://www.suse.com/security/cve/CVE-2024-39463

https://www.suse.com/security/cve/CVE-2024-39494

https://www.suse.com/security/cve/CVE-2024-40902

https://www.suse.com/security/cve/CVE-2024-40937

https://www.suse.com/security/cve/CVE-2024-40954

https://www.suse.com/security/cve/CVE-2024-40956

https://www.suse.com/security/cve/CVE-2024-40989

https://www.suse.com/security/cve/CVE-2024-40994

https://www.suse.com/security/cve/CVE-2024-41011

https://www.suse.com/security/cve/CVE-2024-41012

https://www.suse.com/security/cve/CVE-2024-41059

https://www.suse.com/security/cve/CVE-2024-41069

https://www.suse.com/security/cve/CVE-2024-41090

https://www.suse.com/security/cve/CVE-2024-42093

https://www.suse.com/security/cve/CVE-2024-42145

https://www.suse.com/security/cve/CVE-2024-42230

Plugin Details

Severity: High

ID: 205650

File Name: suse_SU-2024-2929-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 8/16/2024

Updated: 8/16/2024

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2022-0854

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2024-40902

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:kernel-livepatch-5_14_21-150400_24_128-default, p-cpe:/a:novell:suse_linux:kernel-macros, p-cpe:/a:novell:suse_linux:kernel-zfcpdump, p-cpe:/a:novell:suse_linux:kernel-64kb-devel, p-cpe:/a:novell:suse_linux:ocfs2-kmp-default, p-cpe:/a:novell:suse_linux:dlm-kmp-default, p-cpe:/a:novell:suse_linux:kernel-default-base, p-cpe:/a:novell:suse_linux:kernel-64kb, p-cpe:/a:novell:suse_linux:kernel-default-livepatch, p-cpe:/a:novell:suse_linux:kernel-default-devel, p-cpe:/a:novell:suse_linux:kernel-devel, p-cpe:/a:novell:suse_linux:gfs2-kmp-default, p-cpe:/a:novell:suse_linux:kernel-syms, cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:kernel-default-livepatch-devel, p-cpe:/a:novell:suse_linux:cluster-md-kmp-default, p-cpe:/a:novell:suse_linux:kernel-obs-build, p-cpe:/a:novell:suse_linux:kernel-default, p-cpe:/a:novell:suse_linux:kernel-source, p-cpe:/a:novell:suse_linux:reiserfs-kmp-default

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/15/2024

Vulnerability Publication Date: 3/7/2022

Reference Information

CVE: CVE-2021-4439, CVE-2021-47534, CVE-2021-47576, CVE-2021-47578, CVE-2021-47580, CVE-2021-47582, CVE-2021-47583, CVE-2021-47584, CVE-2021-47585, CVE-2021-47586, CVE-2021-47587, CVE-2021-47589, CVE-2021-47592, CVE-2021-47596, CVE-2021-47597, CVE-2021-47598, CVE-2021-47600, CVE-2021-47601, CVE-2021-47602, CVE-2021-47603, CVE-2021-47607, CVE-2021-47608, CVE-2021-47609, CVE-2021-47611, CVE-2021-47612, CVE-2021-47614, CVE-2021-47615, CVE-2021-47616, CVE-2021-47617, CVE-2021-47618, CVE-2021-47619, CVE-2021-47620, CVE-2021-47622, CVE-2021-47624, CVE-2022-0854, CVE-2022-20368, CVE-2022-28748, CVE-2022-2964, CVE-2022-48711, CVE-2022-48712, CVE-2022-48713, CVE-2022-48715, CVE-2022-48717, CVE-2022-48720, CVE-2022-48721, CVE-2022-48722, CVE-2022-48723, CVE-2022-48724, CVE-2022-48725, CVE-2022-48726, CVE-2022-48727, CVE-2022-48728, CVE-2022-48729, CVE-2022-48730, CVE-2022-48732, CVE-2022-48734, CVE-2022-48735, CVE-2022-48736, CVE-2022-48737, CVE-2022-48738, CVE-2022-48739, CVE-2022-48740, CVE-2022-48743, CVE-2022-48744, CVE-2022-48745, CVE-2022-48746, CVE-2022-48747, CVE-2022-48749, CVE-2022-48751, CVE-2022-48752, CVE-2022-48754, CVE-2022-48756, CVE-2022-48758, CVE-2022-48759, CVE-2022-48760, CVE-2022-48761, CVE-2022-48763, CVE-2022-48765, CVE-2022-48767, CVE-2022-48768, CVE-2022-48769, CVE-2022-48771, CVE-2022-48773, CVE-2022-48774, CVE-2022-48775, CVE-2022-48776, CVE-2022-48777, CVE-2022-48778, CVE-2022-48780, CVE-2022-48783, CVE-2022-48784, CVE-2022-48786, CVE-2022-48787, CVE-2022-48788, CVE-2022-48789, CVE-2022-48790, CVE-2022-48791, CVE-2022-48792, CVE-2022-48793, CVE-2022-48794, CVE-2022-48796, CVE-2022-48797, CVE-2022-48798, CVE-2022-48799, CVE-2022-48800, CVE-2022-48801, CVE-2022-48802, CVE-2022-48803, CVE-2022-48804, CVE-2022-48805, CVE-2022-48806, CVE-2022-48807, CVE-2022-48811, CVE-2022-48812, CVE-2022-48813, CVE-2022-48814, CVE-2022-48815, CVE-2022-48816, CVE-2022-48817, CVE-2022-48818, CVE-2022-48820, CVE-2022-48821, CVE-2022-48822, CVE-2022-48823, CVE-2022-48824, CVE-2022-48825, CVE-2022-48826, CVE-2022-48827, CVE-2022-48828, CVE-2022-48829, CVE-2022-48830, CVE-2022-48831, CVE-2022-48834, CVE-2022-48835, CVE-2022-48836, CVE-2022-48837, CVE-2022-48838, CVE-2022-48839, CVE-2022-48840, CVE-2022-48841, CVE-2022-48842, CVE-2022-48843, CVE-2022-48847, CVE-2022-48849, CVE-2022-48851, CVE-2022-48853, CVE-2022-48856, CVE-2022-48857, CVE-2022-48858, CVE-2022-48859, CVE-2022-48860, CVE-2022-48861, CVE-2022-48862, CVE-2022-48863, CVE-2022-48866, CVE-2023-1582, CVE-2023-37453, CVE-2023-52591, CVE-2023-52762, CVE-2023-52766, CVE-2023-52800, CVE-2023-52885, CVE-2023-52886, CVE-2024-26583, CVE-2024-26584, CVE-2024-26585, CVE-2024-26800, CVE-2024-26813, CVE-2024-26814, CVE-2024-26976, CVE-2024-35878, CVE-2024-35901, CVE-2024-35905, CVE-2024-36926, CVE-2024-36974, CVE-2024-38541, CVE-2024-38555, CVE-2024-38559, CVE-2024-39463, CVE-2024-39494, CVE-2024-40902, CVE-2024-40937, CVE-2024-40954, CVE-2024-40956, CVE-2024-40989, CVE-2024-40994, CVE-2024-41011, CVE-2024-41012, CVE-2024-41059, CVE-2024-41069, CVE-2024-41090, CVE-2024-42093, CVE-2024-42145, CVE-2024-42230

SuSE: SUSE-SU-2024:2929-1